Accelerated by:


Copyright © 2025 Apollo Cybersecurity

.webp)
Microsoft 365 accounts — a critical piece of the digital infrastructure of thousands of companies — are being the subject of a new and dangerous wave of phishing attacks. This time the attackers don't want you to enter your password directly, but rather they trick you into granting permissions to malicious applications through OAuth, allowing them to access your resources without needing to know your credentials.
Unlike traditional phishing that attempts to steal a username and password, this approach exploits trust in the application authorization process: if you consent without verifying, you're opening the door for yourself.
This type of attack exploits a human and procedural vulnerability, not a technical flaw itself, and that is why it is so difficult to detect without adequate awareness and controls.
In this campaign, attackers send emails with links that appear legitimate (for example, invitations to documents or collaboration notifications). Upon clicking, the user is redirected to a consent page that mimics Microsoft 365.
If the user approves the requested permissions — for example, access to email, files or profiles — the malicious application is authorized. From then on, attackers can:
All this without the user having entered their password on a fraudulent page.
This isn't traditional phishing. There's no need to “hack” the password when you can manipulate the user into giving up access voluntarily.
It works because:
Attackers have understood that credentials aren't always the target; sometimes they're just the key that the user himself hands over.
OAuth-based attacks demonstrate that cybercriminals are migrating from traditional techniques to others that exploit legitimate authorization flows to gain persistent access without breaking passwords.
At Apolo Cybersecurity, we help you strengthen the security of your digital environment from the root: we audit and strengthen application consent policies, implement access and verification controls at multiple levels, train your teams to detect and stop attacks based on social engineering, and we design specific defenses to prevent phishing.
.webp)